Products
Personal Monitor
Record PC users's actions, grab screenshots and passwords
Keylogger
Keystrokes recording software. Keylogger free trial
Hoverwatch
Cell phone and computer spy
Employee Monitor
Access and control the time spent by your workers
Terminal Monitor
Track employee activities on Terminal Server
Free Keylogger
Free keyboard logger keeps track of all typed text

Personal Monitor 8.4 Update

14 May 2015

We are happy to announce that we have finally launched an update of our Refog Personal Monitor software, which, once again, has a function of user social networks activity interception.

pm-social-1

Based on the requests to our technical support, this function has been anticipated and demanded by the majority of users.

More »

Keyloggers and the Law: Learn from the Mistake of Others

14 May 2015

Yet another story of a criminal case against someone using keyloggers has caused quite a storm; thus, we would like to discuss whether this program is actually legal or not.

shutterstock_154122851

Also, we want to inform you about a new very important update to our program’s interface that is supposed to help our users avoid innocent infringement.

01

More »

Internet and children: parental monitoring software

13 November 2014

We are used to being calm and relaxed when our children are at home. We rightfully assume that they are safe here, away from the dangers of city streets, away from maniacs and crooks… They are in their room, browsing the web, learning new things… educating themselves.
However, this is exactly the type of situation when your child can be in danger. And it’s not about their slouching or bad eyesight. Things can get much worse.

What do we know about the Internet?
And what do we not know about the ways of protecting our children.

Statistics:

Every fourth child has seen porn on the web.
An innocent search query like “red pussy” can bring up results that have nothing to do with pets.

Every third has been psychologically humiliated online, and only 10% of them have told their parents about it.
Social networks are formed by a group of people, and its virtual nature does not make it completely harmless. Teenage media moved from school corridors to the vast spans of social networks long ago, so abusive messages and mocking can result in serious psychological problems and even catastrophic tragedies.

Eight out of ten children are ready to provide private information in exchange for products, services or access to information.
Fraudsters’ sites have learned to work with children. In exchange for products or services, they can fill out questionnaires with very personal questions, up to their parents’ credit card details.

child-security

HOW CAN WE protect our children?

More »

Computer and user monitoring software

9 July 2013

American journalists have discovered a video on YouTube that has never been intended for public viewing. It was uploaded back in 2010 for demonstration at the Federal Security Conference (that took place in April 2012), but it was never shown – the developers decided that the software was really not ready.

The author of the video and the software shown in it is the American defense company Raytheon, and the software is RIOT (Rapid Information Overlay Technology). The video can easily be found on YouTube by typing in the full name.

It is a computer and user monitoring software that uses a large number of data sources, including social networks (Facebook, Foursquare, Twitter, etc.). A data unit (personal file) is assigned to each user within the software, where information is gathered from all possible sources.

The monitoring software collects information on contacts, places visited, and typical routes. User’s photos are analyzed – the appearance is identified, EXIF tags are analyzed with the GPS data and times the pictures were taken. By analyzing the gathered information, the software predicts the future actions of the person.

Raytheon confirmed the authenticity of the video and stated that the software has not yet been sold to the client – the federal agency.

Development of monitoring software is a global trend that seems to have been around for a while, but is just beginning to gather steam.

Despite its formidable functionality, this software can be used in hundreds of peaceful and lawful ways.

refog-employee-monitor_51419

downloadFor example, if your children use your computer in your absence, information gathering about their activities can make life much simpler both for the children and for their parents – after all, you can avert many dangers of modern day Internet that way.

And you don’t have to sign a contract with a defense company to do it; you can simply download the Personal Monitor software and install it on your computer. For the first 3 days the software is free in the fully functional mode.

Update to version 7.2.0.1443

13 February 2012

In this program update there are not that many innovations, but it’s worth writing about it as well. It is made almost completely on the basis of joint work by programmers, the technical support department, and actual users of our programs.

In all the programs, we added the feature of capturing user’s messages in the VKontakte (vk.com) social network. Many users have asked me for this for a long time now.

The Ukrainian language was added to the programs’ interface. The translation was done by one of our users, so thank you very much to him.

The Ukrainian language

We are continuing to work on improving the encrypting system for logs in Employee Monitor and Terminal Monitor. In extremely rare cases, it works incorrectly and greatly slows down the work of the program.

Thanks to reports like this from our users, we were able to solve the problem. In the next versions of the programs, we will be able to get rid of it completely.

 

New online service from Refog. Track any device online. Just install the cell phone spy. And Information from your phones and computers will reflect in your online Hoverwatch account.

Updates and improvements, version 6.4.3.1164

8 August 2011

We did not announce any changes we made in our programs for a long time while we were releasing new versions. Therefore, today we decided to hold a slight review and recall everything.

One of the most important updates was the development of a module for protecting financial information. This is a special script that automatically searches for lines in the program’s logs that are similar to credit card numbers, and deletes them from the monitoring journal. Screenshots made at that moment are also deleted.

These protective mechanisms work only in cases when this is possible and do not guarantee protection in absolutely all cases. The script is gradually being improved to minimize false alarms and errors. It cannot be turned off since its very existence carries out legislative norms.

For the programs Employee Monitor and Terminal Monitor, due to many requests from the users, a feature was added of configuring log storage in a local or network folder specified by the user.

configuring log storage

A lot of work was done to improve the support of the latest versions of internet browsers (Opera, Firefox).

There was an improvement to message monitoring in Facebook, the social network.

The Turkish and Polish languages were added to the program interface.

 

New online service from Refog. Track any device online. Just install the tracker free. And Information from your phones and computers will reflect in your online Hoverwatch account.

Protecting children from online threats: methods and cost

21 December 2010

Ironically, the realities of today’s Internet dictate the need for protecting children from it. These days, even adults cannot avoid the traps set on the global network, much less children.

Protecting children from online threats: methods and costThe number of psychic, emotional, physical and financial threats that Internet users are exposed to is steadily growing very day.

Thousands of sites with content absolutely inappropriate for children’s eyes, erotic images and pornography, violence and all kinds of intolerance, spam and the already commonplace «adult» ads even on harmless mainstream sites, viruses and incessant attempts of scammers to steal your information or money — this is just a short list of things that are all over the Internet and finding them is not a problem at all.

What programs can parents use for restricting children’s access to unwanted content? There are several approaches to solving this problem:

  • Protecting using integrated OS and browser functions.
  • Using a special module of a paid anti-virus tool.
  • Restriction on the Internet provider’s end.
  • Using activity monitoring programs.
  • Using specialized software (free and commercial).

Let’s take a look at these methods in more detail and considering the license costs involved. More »

Update 6.2.4.1116

1 November 2010

We’ve released a regular update for Refog Personal Monitor and Refog Employee Monitor — 6.2.4.1116.

The latest version accommodates to the latest changes in Facebook chat. Previous versions are no longer supported due to recent changes in the social network.

Also there are minor user interface fixes and an updated web browser tracking module that supports the latest version of Google Chrome.

If you have automatic updates disabled you can download the update manually from our web site.

Update to version 6.2.2.1107

3 September 2010

A regular update version 6.2.2.1107 is available for Refog Personal Monitor and Employee Monitor.

The main change is added support for Google Chrome. As well as minor error fixed and user interface tweaks.

If you have automatic product updates disabled you can download the update right from our web site.

Update to version 6.1.7.1044

10 June 2010

We have made a regular update of Refog Personal Monitor and Employee Monitor programs to version 6.1.7.1044.

The main change compared with the previous version:

  • Added support for different mail servers, including Hotmail and Live.com.

You can already download the new version of softwares from our website or simply wait until the program will remind about the update.